/external/selinux/libselinux/utils/ |
compute_av.c | 42 if (avd.auditallow) { 43 printf("auditallow="); 44 print_access_vector(tclass, avd.auditallow);
|
/external/selinux/libsepol/include/sepol/policydb/ |
flask_types.h | 59 sepol_access_vector_t auditallow; member in struct:sepol_av_decision
|
/external/selinux/libselinux/src/ |
compute_av.c | 55 &avd->auditallow, &avd->auditdeny, 91 avd->auditallow = lavd.auditallow; 145 avd->auditallow = lavd.auditallow;
|
mapping.c | 201 if (avd->auditallow & current_mapping[tclass].perms[i]) 203 avd->auditallow = result;
|
avc.c | 706 audited = requested & avd->auditallow; 738 avd->auditallow = 0; 957 node->ae.avd.auditallow |= perms; 960 node->ae.avd.auditallow &= ~perms;
|
/external/libselinux/src/ |
compute_av.c | 55 &avd->auditallow, &avd->auditdeny,
|
mapping.c | 201 if (avd->auditallow & current_mapping[tclass].perms[i]) 203 avd->auditallow = result;
|
avc.c | 666 audited = requested & avd->auditallow; 703 avd->auditallow = 0; 902 node->ae.avd.auditallow |= perms; 905 node->ae.avd.auditallow &= ~perms;
|
/system/sepolicy/ |
platform_app.te | 33 auditallow platform_app cache_recovery_file:dir create_dir_perms; 34 auditallow platform_app cache_recovery_file:file create_file_perms;
|
/external/libselinux/include/selinux/ |
selinux.h | 112 access_vector_t auditallow; member in struct:av_decision
|
/external/selinux/policycoreutils/sepolicy/ |
search.c | 88 bool auditallow; member in struct:options 656 if (!opt->all && !opt->allow && !opt->nallow && !opt->auditallow && !opt->dontaudit) { 672 if (opt->auditallow || opt->all) 884 bool auditallow, 903 cmd_opts.auditallow = auditallow; 1014 int auditallow = Dict_ContainsInt(dict, "auditallow"); variable 1028 return search(allow, neverallow, auditallow, dontaudit, transition, role_allow, src_name, tgt_name, class_name, permlist);
|
/external/selinux/checkpolicy/ |
policy_scan.l | 139 AUDITALLOW | 140 auditallow { return(AUDITALLOW); }
|
/external/selinux/libselinux/include/selinux/ |
selinux.h | 131 access_vector_t auditallow; member in struct:av_decision
|
/external/selinux/prebuilts/bin/ |
sediff.py | 56 terule.add_argument("--auditallow", action="store_true", help="Print auditallow rule differences") 91 args.allow, args.neverallow, args.auditallow, args.dontaudit, 515 if all_differences or args.auditallow: 517 args.auditallow: 518 print("Auditallow Rules ({0} Added, {1} Removed, {2} Modified)".format( 523 print(" Added Auditallow Rules: {0}".format(len(diff.added_auditallows))) 528 print(" Removed Auditallow Rules: {0}".format(len(diff.removed_auditallows))) 533 print(" Modified Auditallow Rules: {0}".format(len(diff.modified_auditallows))) [all...] |
/external/selinux/libsepol/tests/policies/test-cond/ |
refpolicy-base.conf | [all...] |
/external/selinux/libsepol/src/ |
services.c | 860 avd->auditallow = 0; 890 avd->auditallow |= node->datum.data; [all...] |
conditional.c | 896 * are retained (much unlike the allow and auditallow cases). 901 avd->auditallow |= node->datum.data;
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/selinux/ |
__init__.py | 763 __swig_setmethods__["auditallow"] = _selinux.av_decision_auditallow_set 764 __swig_getmethods__["auditallow"] = _selinux.av_decision_auditallow_get 765 if _newclass:auditallow = _swig_property(_selinux.av_decision_auditallow_get, _selinux.av_decision_auditallow_set) [all...] |